[PATCH v2] kwboot: do a filetype check before sending the image
Trent Piepho
tpiepho at kymetacorp.com
Wed Jan 20 11:27:00 PST 2016
On Wed, 2016-01-20 at 09:15 +0100, Uwe Kleine-König wrote:
> The images that can be sent to a Marvell CPU have a fixed format. Do
> some sanity checks before actually sending an image for easier diagnosis
> of broken files.
>
> Signed-off-by: Uwe Kleine-König <uwe at kleine-koenig.org>
> ---
> Changes since (implicit) v1, sent with
> Message-Id: 1453276010-4669-1-git-send-email-uwe at kleine-koenig.org:
>
> - whitespace fix
> - error out if a problem is detected
> - add a commit log
>
> scripts/kwboot.c | 55 +++++++++++++++++++++++++++++++++++++++++++++++++++++++
> 1 file changed, 55 insertions(+)
>
> diff --git a/scripts/kwboot.c b/scripts/kwboot.c
> index 46328d8ed006..06e58f6a7e3b 100644
> --- a/scripts/kwboot.c
> +++ b/scripts/kwboot.c
> @@ -546,6 +546,59 @@ out:
> return rc;
> }
>
> +static int
> +kwboot_check_image(unsigned char *img, size_t size)
Make it const unsigned char?
> +{
> + size_t i;
> + size_t header_size, image_size;
> + unsigned char csum = 0;
> +
> + switch (img[0x0]) {
> + case 0x5a: /* SPI/NOR */
> + case 0x69: /* UART0 */
> + case 0x78: /* SATA */
> + case 0x8b: /* NAND */
> + case 0x9c: /* PCIe */
> + break;
> + default:
> + printf("Unknown boot source: 0x%hhx\n", img[0x0]);
> + goto err;
> + }
> +
> + if (img[0x8] != 1) {
> + printf("Unknown version: 0x%hhx\n", img[0x8]);
> + goto err;
> + }
If you're verifying the image, maybe also check that size > 8 before
reading img[0x8]? Otherwise you could crash instead of rejecting a too
small image.
And having compared the version tag to 1, couldn't you then cast img
into a struct main_hdr_v1 *? That would avoid all the hard coded magic
offsets in the rest of the code. Unless img isn't aligned?
> +
> + image_size = img[0x4] | (img[0x5] << 8) |
> + (img[0x6] << 16) | (img[0x7] << 24);
struct main_hdr_v1 *hdr = (const struct main_hdr
image_size = le32_to_cpu(hdr->blocksize);
or if unaligned:
image_size = get_unaligned_le32(&img[0x4]);
> +
> + header_size = (img[0x9] << 16) | img[0xa] | (img[0xb] << 8);
header_size = hdr->headersz_msb << 16 | le16_to_cpu(hdr->headersz_lsb);
> +
> + if (header_size + image_size != size) {
> + printf("Size mismatch (%zu + %zu != %zu)\n",
> + header_size, image_size, size);
> + goto err;
> + } else {
Don't really need the else block here since the failure above exits,
just like the two failure checks before this one.
> + for (i = 0; i < header_size; ++i)
> + csum += img[i];
csum = image_checksum8(img, header_size)
> +
> + csum -= img[0x1f];
> +
> + if (csum != img[0x1f]) {
> + printf("Checksum mismatch: header: 0x%02hhx, calculated: 0x%02hhx\n",
> + img[0x1f], csum);
> + goto err;
> + }
> + }
> +
> + return 0;
> +
> +err:
> + errno = EINVAL;
> + return 1;
> +}
> +
> static void *
> kwboot_mmap_image(const char *path, size_t *size, int prot)
> {
> @@ -574,6 +627,8 @@ kwboot_mmap_image(const char *path, size_t *size, int prot)
>
> rc = 0;
> *size = st.st_size;
> +
> + rc = kwboot_check_image(img, *size);
> out:
> if (rc && img) {
> munmap(img, st.st_size);
More information about the barebox
mailing list